Attacks and defences adapt and evolve in a continuing dance. As a new technique is developed, its effectiveness increases rapidly until it is ready for deployment. Once deployed, broad exposure to real-world scenarios, feedback to the developmen

A senior executive of Alphabet Inc's Google unit said on Monday that the company was notifying customers of 4,000 state-sponsored cyber attacks per month.
Speaking at a Fortune magazine tech conference in Aspen, Colorado, Goog

Cyber-attacks remain a top threat, followed by data breaches and unplanned IT and telecom outages, according to a new report.
Risks faced by an organisation can range from minor threats to large crises that can threaten your reput

Cyber attackers are now bolder, smarter and more daring in attack vectors, cyberespionage efforts and cyber underground activity on a global basis, Trend Micro said in its annual security roundup report.
“Our observations fo

A new analysis provides insight into topics like the average earnings of a cyber attacker, the amount of time attacks typically take, and how to prevent successful data breaches by increasing the cost of conducting them.
Adversari

Government enterprises in the UAE can combat state-sponsored cyber-attacks that target sensitive information in various ways, said an industry expert.
In addition to patching vulnerabilities and implementing multi-factor authentic

Government enterprises in the UAE can combat state-sponsored cyber-attacks that target sensitive information in various ways, said an industry expert.
In addition to patching vulnerabilities and implementing multi-factor authentic

Cyber attacks on the private sector are an increasingly important risk in corporate credit analysis, US ratings agency Moody’s Investors Service said on Monday.
The threat of computer hacking varies from sector to sector and

Cybercriminals became more inventive in their attacks during the second quarter of 2015 to infiltrate and abuse existing technologies that are often overlooked, a Trend Micro report said, highlighting targeted attacks to public utilities.

Highly specific applications, programs, operating systems, and setups did not prevent threat actors from launching effective attacks in 2014, according to a report.
Trend Micro, a global leader in security software, has revealed t